You are here: Technician's functions > Appendix: installation vectors > Exploit vector (desktop)

Exploit vector (desktop)

Purpose

Compiling creates an installer which, when opened on the target device, exploits the vulnerability of a specific program. Different behaviors may be experienced, depending on the specific Exploit (i.e. the running program is aborted).

Installation

The installer is created and the packet of utility files is automatically savedC:\RCS\Collector\public in the folder. These files may be used in many types of attacks (i.e.: via link from a website).

Deleting no longer used files

Packets saved in the folder C:\RCS\Collector\public can be deleted using the File Manager function, see "Front end management".

Operating systems

OS X, Windows

Parameters
Name Description
File type Type of file to be infected (i.e.: .PDF).
Choose an Exploit Full application name used by the target to open the file (i.e.: Adobe Acrobat Reader 10).

URL

Document

....

URL pointing to the desired agent installation package.

URL: connection to an Anonymizer where the installer was saved.

Document: to select the file to be infected.

 

 

RCS8.2 | User's and Installation Guide | © COPYRIGHT 2012